Lucene search

K
gentooGentoo FoundationGLSA-200705-06
HistoryMay 05, 2007 - 12:00 a.m.

X.Org X11 library: Multiple integer overflows

2007-05-0500:00:00
Gentoo Foundation
security.gentoo.org
17

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.029 Low

EPSS

Percentile

90.7%

Background

X.Org is an implementation of the X Window System. The X.Org X11 library provides the X11 protocol library files.

Description

Multiple integer overflows have been reported in the XGetPixel() function of the X.Org X11 library.

Impact

By enticing a user to open a specially crafted image, an attacker could cause a Denial of Service or an integer overflow, potentially resulting in the execution of arbitrary code with root privileges.

Workaround

There is no known workaround at this time.

Resolution

All X.Org X11 library users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=x11-libs/libX11-1.0.3-r2"
OSVersionArchitecturePackageVersionFilename
Gentooanyallx11-libs/libx11< 1.0.3-r2UNKNOWN

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.029 Low

EPSS

Percentile

90.7%